Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Nov 2001 10:18:07 -0500
From:      Kutulu <kutulu@kutulu.org>
To:        Anthony Atkielski <anthony@atkielski.com>
Cc:        Giorgos Keramidas <charon@labs.gr>, freebsd-questions@FreeBSD.ORG
Subject:   Re: Re[2]: Tiny starter configuration for FreeBSD
Message-ID:  <20011108101807.A10218@pr0n.kutulu.org>
In-Reply-To: <002501c1682b$a542b7a0$0a00000a@atkielski.com>; from anthony@atkielski.com on Thu, Nov 08, 2001 at 09:01:54AM %2B0100
References:  <15330.6606.417524.41024@guru.mired.org> <002b01c1635f$5a5f4300$0a00000a@atkielski.com> <20011108022328.F79276@hades.hell.gr> <002501c1682b$a542b7a0$0a00000a@atkielski.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Nov 08, 2001 at 09:01:54AM +0100, Anthony Atkielski wrote:
> Currently I have telnetd turned off, and only sshd is running.  I also have all
> incoming telnet and ssh traffic blocked at the router, and I only log in from my
> tiny LAN.  So I should be safe logging in directly as root, although I might
> reconsider if I ever need to log into the system from a remote location.

If you only allow your root logins via a DSA public key (in sshd_config, 
set PermitRootLogins = without-password), there's a very good argument that
you will be just as secure logging is as root, as you would be logging in as
a user and using 'su'.  That is, if a malicious person is able to crack your DSA
keys and pretend to be you, he/she can probably also locate the root password
in the encrypted stream immediately following 'su', and decrypt it.

> ----- Original Message -----
> From: "Giorgos Keramidas" <charon@labs.gr>
> To: "Anthony Atkielski" <anthony@atkielski.com>
> Cc: <freebsd-questions@FreeBSD.ORG>
> Sent: Thursday, November 08, 2001 01:23
> Subject: Re: Re[2]: Tiny starter configuration for FreeBSD
> 
> 
> > > For example, one change I made to my system was to allow root logins
> > > from remote terminals.  I'd prefer to limit remote logins to root to
> > > my other machine, which is on the LAN, but I'm not aware of an
> > > option to force that, so I had to open root logins to the world.

Again... set up root to permit logins only through SSH, only with a DSA key.  
Then, in /root/.ssh/authorized_keys2, you can limit specific keys to only 
being valid coming from certain hosts:

     from="pattern-list"
             Specifies that in addition to RSA authentication, the canonical
             name of the remote host must be present in the comma-separated
             list of patterns (`*' and `?'  serve as wildcards).

(DSA keys and RSA keys are stored in the same file format, so the same options
apply to both.)

--K

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011108101807.A10218>